Skip to main content

Network Security in IT Fundamentals

 


    Network Security is major part of today’s IT world. Hardware, the computers operating systems, databases and computer applications are just some of the essential components of information technology fundamentals. These components are not impenetrable, that’s where network security comes into play. It is the digital security guard for the computer and all of these components that is preventing unauthorized access to data that’s stored on your computer. Pictures, email addresses, passwords and bank account information are targets that a hacker might want to obtain and having proper network security will aid in the protection of those assets.

 

Information Technology Concepts and Network Security

Network security relates to information technology concepts as IT is all about managing, exchanging, processing and protecting information and network security is ensuring that information remains intact and available to only the authorized users. Network security is under the computer science umbrella; however, computer science is more geared towards computational problems whereas network security is more about the security of the information on the computer. Network security even existed in the early years of computers, but in a different manner. Network security was more about the physical protection of the computers as they were isolated in different rooms, focusing on ensuring that only required personnel had physical access to it.

 

Reliance on Major Hardware

Some major computer components that network security relies on is the RAM, Storage, CPU and cooling fans. Sufficient RAM is necessary for computers to run antivirus software smoothly as the more RAM you have the faster your computer will operate. Storage is important to network security for maintaining the backup files and sensitive information. The CPU is the brain of the computer that runs the program instructions. Network security really can’t exist without the CPU of the computer. Finally, cooling fans are important as they prevent overheating of the CPU and other components and overheating can lead to hardware failure, putting your system at risk. Cooling fans ensure the smooth operation of security systems by keeping that temperature in check and facilitating optimal operation.

 

Network Security and Programing Languages

            Network Security relies on programming languages heavily such as Python and JavaScript. As described in Codecademy, these programming languages allows for automated tasks to detect and analyze potential malware (Carpenter, 2021). They can also be used for penetration testing to help see if any potential vulnerabilities exist. Main execution methods in network security would be in real time and on a scheduled basis. Some programs should be running real time to be able to respond to threats as they happen real time, whereas scans, updates and backups will probably be on that routine scheduled basis. These programming languages is what allows these network security systems to operate when intended.  

 

Application Software in Network Security

            Application software much like programming languages plays a vital role in network security. Security software such as antivirus software like McAfee or Norton and firewalls will be the first line of defense that can detect and prevent potential malware from your network. Other software such as a VPN help create encrypted and secure connections, aiding in the privacy of the user. These application software’s provide a necessary means to monitor and protect networks against potential cyberthreats that occur on a daily basis all over the world. Without these applications running, it leaves your network extremely vulnerable to hackers who want to get that data on that network and leave your network in shambles.

 

Database Management

            A database is where information is stored, managed and where it can be accessed electronically. A couple examples of this would be how most, if not all hospitals store patient data or how Amazon keeps track of their inventory. That all gets inputted into a database of some kind. Database management utilizes management systems such as Oracle Database to be able to add, edit, query and delete information within the database. Network securities role in relation to databases is all about safeguarding the information stored on these databases. This happens by means of access control, vulnerability management, firewall protection and system backups and recovery. 

 

Network Architecture, Management and Security

            Network architecture is composed of the aspects of the network, such as routers, switches, modems and storage of the data to name a few according to eSecurity planet (Kime, 2024). Managing that network is all about maintaining and monitoring that network to ensure it is functioning as intended. Implementing solid network security can ensure that the hardware and software of that network are being protected and can withstand the different kinds of cyber attacks, mitigating security incidents, preventing unauthorized access and simply maintaining the overall integrity of that network.  

 

 

 

 

References:

Carpenter, A. Codecademy. (2021, Jun 15). What Programming Languages Are Used in Cybersecurity?. https://www.codecademy.com/resources/blog/what-programming-languages-are-used-in-cybersecurity/

Crocetti, P. (2025, Jan 15). Tech Accelerator. Data storage management: What is it and why is it important?. https://www.techtarget.com/searchstorage/Data-storage-management-What-is-it-and-why-is-it-important

Kime, C. (2024, Apr 26). eSecurity Planet. Network Security Architecture: Best Practices & Tools https://www.esecurityplanet.com/networks/network-security-architecture/?form=MG0AV3

Lysecky, S, Vahid, F, Wheatland, N. (2019, February). TEC 101: Fundamentals of Information Technology & Literacy.

MOOC.org. (2021, Nov 16). Cybersecurity and Computer Science: What’s the Connection?. https://www.mooc.org/blog/cybersecurity-and-computer-science-whats-the-connection

Comments

Popular posts from this blog

The Pros and Cons of Microsoft Word, Excel, and PowerPoint

    All throughout the information technology world you will at some point have to utilize applications such as Microsoft Word, Excel and PowerPoint. These are some of the most common and basic applications that are out there today. Today I will be discussing the advantages and disadvantages of each, and how they compare to one another. Microsoft Word Advantages: Versatility in Writing: Word is perfect for all writing purposes, whether you're drafting a book, essay, poetry, contract or work memorandum. Formatting: It offers a lot of formatting tools, including various font styles, sizes, alignments, customizable margins, and borders for a more appealing document. User Friendly: This application is really easy for the user to utilize, navigate and learn quickly. Disadvantages: Limited Data Formatting: Word excels in writing and formatting that text, however, it lacks the data formatting capabilities found in other applic...

Intro to Programming Languages

  Having very little IT experience, this project is my first steps towards a better background in that department. It is exciting and makes me nervous at the same time as I have never used nor even read about programming languages before. This was the same for the program Scratch, but the outcome was positive and gave me a better understanding of what program coding consists of. The following is the link to my Scratch program :  https://scratch.mit.edu/projects/1116622511 This was quite interesting, having never used the program Scratch, I found myself struggling a bit at first trying to figure out how all the different codes would affect the outcome. Once I had a decent grasp of that, I knew what I wanted to do but getting the figures to do it how I wanted was the challenge. The biggest challenge was getting the timing right for everything. I overcame this by simple trial and error. I would set a time for something, run the program and see if it needed to be slowed or sped up...

Computers in The Healthcare Industry

    Computers in The Workplace Today, I will explore the significant impact computers have on the healthcare industry. While my perspective comes from personal experiences as a visitor and patient rather than a professional standpoint, it's evident that computers play a crucial role in modern healthcare. Changing Healthcare Through Technology           One of the most noticeable impacts of computers is the transition from paper based records to digital medical records. This change has made it easier for patients to access their own records, schedule appointments through computer application systems, and even how they check in for appointments using digital devices. Many healthcare facilities have replaced the traditional paper and clipboard method with iPads to collect patient information. Computers also allow the ability for telemedicine, enabling patients to consult with healthcare professionals from home. These are just a f...